Sciweavers

22193 search results - page 4396 / 4439
» Multiple Restricted Multiplication
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
Rapid image retrieval for mobile location recognition
Recognizing the location and orientation of a mobile device from captured images is a promising application of image retrieval algorithms. Matching the query images to an existing...
Georg Schroth, Anas Al-Nuaimi, Robert Huitl, Flori...
104
Voted
ICASSP
2011
IEEE
14 years 2 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ICASSP
2011
IEEE
14 years 2 months ago
Use of VTL-wise models in feature-mapping framework to achieve performance of multiple-background models in speaker verification
Recently, Multiple Background Models (M-BMs) [1, 2] have been shown to be useful in speaker verification, where the M-BMs are formed based on different Vocal Tract Lengths (VTLs)...
Achintya Kumar Sarkar, Srinivasan Umesh
ICDE
2011
IEEE
265views Database» more  ICDE 2011»
14 years 2 months ago
RAFTing MapReduce: Fast recovery on the RAFT
MapReduce is a computing paradigm that has gained a lot of popularity as it allows non-expert users to easily run complex analytical tasks at very large-scale. At such scale, task...
Jorge-Arnulfo Quiané-Ruiz, Christoph Pinkel...
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 2 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
« Prev « First page 4396 / 4439 Last » Next »